7.5
CVSSv3

CVE-2018-5733

Published: 16/01/2019 Updated: 09/01/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

isc dhcp 4.1-esv

isc dhcp 4.1.0

isc dhcp

isc dhcp 4.4.0

redhat enterprise linux workstation 6.0

redhat enterprise linux server aus 7.6

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.5

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.4

redhat enterprise linux server 6.0

redhat enterprise linux desktop 6.0

redhat enterprise linux desktop 7.0

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 17.10

debian debian linux 8.0

debian debian linux 7.0

debian debian linux 9.0

Vendor Advisories

Synopsis Important: dhcp security update Type/Severity Security Advisory: Important Topic An update for dhcp is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which ...
Synopsis Important: dhcp security update Type/Severity Security Advisory: Important Topic An update for dhcp is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which ...
Several security issues were fixed in DHCP ...
Several security issues were fixed in DHCP ...
Several vulnerabilities have been discovered in the ISC DHCP client, relay and server The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2017-3144 It was discovered that the DHCP server does not properly clean up closed OMAPI connections, which can lead to exhaustion of the pool of socket descriptors ...
Debian Bug report logs - #887413 isc-dhcp: CVE-2017-3144: dhcp: omapi code doesn't free socket descriptors when empty message is received allowing denial-of-service Package: src:isc-dhcp; Maintainer for src:isc-dhcp is Debian ISC DHCP Maintainers <isc-dhcp@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@deb ...
Debian Bug report logs - #891786 isc-dhcp: CVE-2018-5732: A specially constructed response from a malicious server can cause a buffer overflow in dhclient Package: src:isc-dhcp; Maintainer for src:isc-dhcp is Debian ISC DHCP Maintainers <isc-dhcp@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg&gt ...
Debian Bug report logs - #891785 isc-dhcp: CVE-2018-5733: A malicious client can overflow a reference counter in ISC dhcpd Package: src:isc-dhcp; Maintainer for src:isc-dhcp is Debian ISC DHCP Maintainers <isc-dhcp@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 28 Feb 2018 20:42 ...
Buffer overflow in dhclient possibly allowing code execution triggered by malicious serverAn out-of-bound memory access flaw was found in the way dhclient processed a DHCP response packet A malicious DHCP server could potentially use this flaw to crash dhclient processes running on DHCP client machines via a crafted DHCP response packet (CVE-2018 ...
Buffer overflow in dhclient possibly allowing code execution triggered by malicious serverAn out-of-bound memory access flaw was found in the way dhclient processed a DHCP response packet A malicious DHCP server could potentially use this flaw to crash dhclient processes running on DHCP client machines via a crafted DHCP response packet (CVE-2018 ...
A denial of service flaw was found in the way dhcpd handled reference counting when processing client requests A malicious DHCP client could use this flaw to trigger a reference count overflow on the server side, potentially causing dhcpd to crash, by sending large amounts of traffic ...
A denial of service flaw was found in the way dhcpd handled reference counting when processing client requests A malicious DHCP client could use this flaw to trigger a reference count overflow on the server side, potentially causing dhcpd to crash, by sending large amounts of traffic ...